Airtable

Live

OAUTH 2.0

DATABASE

Every base, table, and structured record your team manages lives in Airtable. Airtable MCP gives your agent authenticated access to bases scoped to the user who authorized it.

  • Acts as the user: Access and write actions stay tied to the Airtable account that authorized the agent.
  • Credentials stay vaulted: AES-256, resolved at request time, never in LLM context.
  • Scoped before every call: User permissions enforced. 90-day audit trail.
Airtable
agent · Acme Q3
Run
What entries in our content roadmap base are flagged for review this week?
S
airtable_records_list
71ms
Data agent
5 entries in Review status this week: Q4 launch brief, pricing FAQ, onboarding email v2, partner one-pager, ROI calculator.
Sources: 5 records, content roadmap base
airtablemcp
5 records
18:29
Message Claude...

Tools your data agent reaches for on Airtable, scoped per user.

CALL ANY TOOL
List bases and tables, query records with formulas, and create or update entries.
airtable_tables_list
List tables
List tables in a specific base.
Parameters
Name
Type
Required
Description
base_id
string
Required
Airtable base ID
airtable_records_list
List records
airtable_record_create
Create record
airtable_record_update
Update record
airtable_record_get
Get record
airtable_bases_list
List bases
Build your Agent
Drop the toolkit in, point it at the user, and your data agent can use Airtable from the first run.
import { ScalekitClient } from "@scalekit-sdk/node";
import { DynamicStructuredTool } from "@langchain/core/tools";
import { createReactAgent } from "@langchain/langgraph/prebuilt";
import { z } from "zod";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["airtable"], toolNames: ["airtable_bases_list", "airtable_tables_list", "airtable_records_list"] },
pageSize: 100,
});

const lcTools = tools.map((t) => new DynamicStructuredTool({
name: t.tool.definition.name,
description: t.tool.definition.description,
schema: z.object({}).passthrough(),
func: async (args) => {
const { data } = await sk.tools.executeTool({
toolName: t.tool.definition.name,
identifier: "user_123",
params: args,
});
return JSON.stringify(data);
},
}));

const agent = createReactAgent({ llm, tools: lcTools });
import { ScalekitClient } from "@scalekit-sdk/node";
import OpenAI from "openai";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);
const openai = new OpenAI();

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["airtable"], toolNames: ["airtable_bases_list", "airtable_tables_list", "airtable_records_list"] },
pageSize: 100,
});

const llmTools = tools.map((t) => ({
type: "function",
function: {
name: t.tool.definition.name,
description: t.tool.definition.description,
parameters: t.tool.definition.input_schema,
},
}));

const resp = await openai.responses.create({
model: "gpt-4o", input: prompt, tools: llmTools,
});
import { ScalekitClient } from "@scalekit-sdk/node";
import Anthropic from "@anthropic-ai/sdk";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);
const anthropic = new Anthropic();

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["airtable"], toolNames: ["airtable_bases_list", "airtable_tables_list", "airtable_records_list"] },
pageSize: 100,
});

const llmTools = tools.map((t) => ({
name: t.tool.definition.name,
description: t.tool.definition.description,
input_schema: t.tool.definition.input_schema,
}));

const msg = await anthropic.messages.create({
model: "claude-sonnet-4-6", max_tokens: 1024,
tools: llmTools,
messages: [{ role: "user", content: prompt }],
});
import { Agent } from "@google/adk/agents";
import {
MCPToolset, StreamableHTTPConnectionParams,
} from "@google/adk/tools/mcp";

const toolset = new MCPToolset({
connectionParams: new StreamableHTTPConnectionParams({
url: "https://mcp.scalekit.com/airtable",
headers: { Authorization: `Bearer ${userScopedToken}` },
}),
});

const agent = new Agent({
name: "agent", model: "gemini-2.0-flash",
tools: await toolset.getTools(),
});
Try these prompts
Paste any prompt into your agent to start using Airtable.
Search & recall
Copy the prompt
Copied
List all records in [table name] with status [status].
Copy the prompt
Copied
Find records in [base] where [field] equals [value].
Copy the prompt
Copied
Show me the schema of [base name].
Copy the prompt
Copied
What records were added to [table] this week?
Action & creation
Copy the prompt
Copied
Create a new record in [table]: [field values].
Copy the prompt
Copied
Update record [id] in [table]: set [field] to [value].
Copy the prompt
Copied
Add a row to [table] with status [status].
Copy the prompt
Copied
Archive records in [table] older than 30 days.
Reporting & sync
Copy the prompt
Copied
How many records are in [table] by status?
Copy the prompt
Copied
Sync new records from [table] to my CRM.
Copy the prompt
Copied
List records edited this week in [base].
Copy the prompt
Copied
Find duplicate records in [table] by [field].
SEE HOW AUTH WORKS
Users authorize Airtable once. Their credentials stay vaulted, every call is checked, and every action is logged.
1
Authorize
Your user connects
Airtable
once. We tie it to their identity and the meetings they approved — no shared bot account, no org-wide access
Who:
user ‘A’
when:
Once per user
access:
Limited to user
2
Store
Their
Airtable
token lives in a vault scoped to them. User A's meetings are never reachable by an agent acting for user B, even on the same connection
vault:
encrypted
scope:
per-user
tokens:
auto-refreshed
3
Resolve
When your agent calls a
Airtable
tool, we fetch the right token server-side. It never touches your agent, never appears in the LLM context, never shows up in your logs
speed:
~40ms
check:
before every call
seen by:
nobody
4
Audit
Every
Airtable
tool call is logged — who triggered it, which meeting was fetched, what came back. 90 days of history, tied to the user who authorized it
history:
90 days
export:
SIEM-ready
logged:
every call
Test other agents
Same per-user auth pattern across other data agents and MCP connectors. Working code, live demos, fork what fits.
GTM
CRM AI agent
Log calls, update opportunity stages, and surface stalled deals across HubSpot or Salesforce. No manual data entry.
ENGINEERING
Engineering standup agent
Aggregate GitHub and GitLab activity, link to Jira, and post a daily standup digest to Slack. No async updates.
Why Scalekit
Secure your agent's access. Connectors ship in minutes
Other connector libraries treat auth as a demo afterthought. Scalekit starts with user identity, scope enforcement, and audit.
01.
Record changes lose user attribution
A shared Airtable token looks fine in a demo. In production, every record read or written looks like it came from a service account. Audit logs break. Per-user scoping breaks. Scalekit resolves the credential of the actual user who triggered the agent, never a shared bot.
// shared bot token
token = "sk_airtable_shared_xxx"
audit → bot_service_account
user_filter → broken

// scalekit · per-user
token = resolve(user_id)
audit → user_abc
scope → enforced ✓
02.
Authentication is not authorization
03.
Multi-tenancy is architectural
04.
Airtable today. Notion, Google Sheets, Linear tomorrow.
“Our agents act across Salesforce, Gong, Google Drive, and more, on behalf of every customer. Scalekit behind the scenes meant we can keep adding tools without ever rebuilding how credentials or tool calling work.”
Venu Madhav Kattagoni
Head of Engineering / Von
Frequently Asked Questions
Does the agent access Airtable as the user or as a shared key?
As the user. Each workspace member authorizes once and Scalekit resolves their credential at request time. Audit logs attribute every action to that user, not a shared service account.
Where is the Airtable oauth 2.0 stored?
Can I limit what the agent is allowed to do in Airtable?
What happens when a user revokes Airtable access?
Which Airtable bases can the agent read?
Start in your coding agent
Up and running in one command
Install the Scalekit skill in your editor of choice. Connector, auth, tools, prompt, all wired up
Claude Code REPL
/plugin marketplace add scalekit-inc/claude-code-authstack
/plugin install agentkit@scalekit-auth-stack
Cursor Code REPL
# ~/.cursor/mcp.json
{
""mcpServers"": {
""airtable"": {
""url"": ""https://mcp.scalekit.com/airtable"",
""headers"": { ""Authorization"": ""Bearer $SCALEKIT_TOKEN"" }
}
}
}
Codex Code REPL
# ~/.codex/config.toml
[mcp_servers.airtable]
url = ""https://mcp.scalekit.com/airtable""
auth_env = ""SCALEKIT_TOKEN""
Copilot Code REPL
# .vscode/mcp.json
{
""servers"": {
""airtable"": {
""url"": ""https://mcp.scalekit.com/airtable"",
""type"": ""http""
}
}
}